A remote code execution vulnerability exists when the Microsoft Speech API (SAPI) improperly handles text-to-speech (TTS) input. The vulnerability could corrupt memory in a way that enables an attacker to execute arbitrary code in the context of the current user. To exploit the vulnerability, an attacker would need to convince a user to open a specially crafted document containing TTS content invoked through a scripting language. The update address the vulnerability by modifying how the system handles objects in memory.
| Software | From | Fixed in |
|---|---|---|
| microsoft / windows_server_2008 | r2-sp1 | r2-sp1.x |
| microsoft / windows_7 | --sp1 | --sp1.x |